summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMalfurious <m@lfurio.us>2024-07-13 03:01:46 -0400
committerMalfurious <m@lfurio.us>2024-07-13 03:01:46 -0400
commit9cfad5e40a180cf9df064de352d04e2935020e3d (patch)
treedf193eb61280f93cf488535a465865bc8101a6f1
parentc8b6d74765064d6205f4d03b2051ee37b8943434 (diff)
downloadmailnode-9cfad5e40a180cf9df064de352d04e2935020e3d.tar.gz
mailnode-9cfad5e40a180cf9df064de352d04e2935020e3d.zip
opendkim: Check additional headers to determine sender
Despite the default semantics for `InternalHosts` option in opendkim.conf, OpenDKIM seems to generally only consider the labeled sender of a message when deciding whether to sign a message or validate. This means that previously, when a message was sent to a mailing list from a domain outside of the mailnode host, the copies of this message that the list sent out did not get a signature applied to them. Since we will usually be injecting headers for mailing list information, we can search these first to determine the message envelope sender. X-Mailing-List will be the list's full address. Sender is added just in case. Advice is taken from the "Mailing Lists" section of http://www.opendkim.org/opendkim-README Signed-off-by: Malfurious <m@lfurio.us>
-rw-r--r--opendkim/opendkim.conf1
1 files changed, 1 insertions, 0 deletions
diff --git a/opendkim/opendkim.conf b/opendkim/opendkim.conf
index 11e1ec6..659d6f1 100644
--- a/opendkim/opendkim.conf
+++ b/opendkim/opendkim.conf
@@ -14,6 +14,7 @@ Canonicalization relaxed/simple
#Mode sv
#SubDomains no
OversignHeaders From
+SenderHeaders X-Mailing-List,Sender,From
# Signing domain, selector, and key (required). For example, perform signing
# for domain "example.com" with selector "2020" (2020._domainkey.example.com),